# Archive

Browse past daily curated stories

May 08 May 05 May 03 May 02 May 01 Apr 30 Apr 28 Apr 26 Apr 25 Apr 24 Apr 23 Apr 22 Apr 21 Apr 20 Apr 19 Apr 18 Apr 17 Apr 16 Apr 15 Apr 14 Apr 12 Apr 11 Apr 10 Apr 09 Apr 08 Apr 07 Apr 05 Apr 04 Apr 03 Apr 02

Wednesday, April 15, 2026

  1. 1
    0
    Krebs on Security threat-intel
    Patch Tuesday, April 2026 Edition

    Microsoft released patches for 167 vulnerabilities in April 2026 Patch Tuesday, including an actively exploited SharePoint Server zero-day and a publicly disclosed Windows Defender flaw called "BlueHammer." Google also patched its fourth Chrome zero-day of 2026, while Adobe fixed an actively exploited Reader vulnerability enabling remote code execution.

  2. 2
    0
    BleepingComputer general
    Microsoft April 2026 Patch Tuesday fixes 167 flaws, 2 zero-days

    Microsoft's April 2026 Patch Tuesday addresses 167 security flaws including 2 zero-day vulnerabilities, marking the second-largest monthly security update on record by CVE count. The patches include fixes for elevation-of-privilege bugs that comprised over half of the vulnerabilities addressed.

  3. 3
    0
    BleepingComputer general
    Over 100 Chrome extensions in Web Store target users accounts and data

    Security researchers discovered over 100 malicious Chrome extensions in the official Web Store targeting users' Google OAuth2 Bearer tokens, deploying backdoors, and conducting ad fraud. These extensions represent a significant supply chain threat through Google's official distribution channel.

  4. 4
    0
    The Hacker News general
    CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

    CISA added 6 actively exploited vulnerabilities to its KEV catalog, including CVE-2026-21643 (CVSS 9.1) affecting Fortinet FortiClient EMS through SQL injection, plus Microsoft and Adobe flaws. The additions indicate ongoing active exploitation of these critical security defects in enterprise environments.

  5. 5
    0
    BleepingComputer general
    Fake Ledger Live app on Apple’s App Store stole $9.5M in crypto

    A fake Ledger Live app distributed through Apple's App Store stole approximately $9.5 million in cryptocurrency from 50 victims within just a few days in April 2026. The malicious macOS application successfully bypassed Apple's security review process to target crypto wallet users.

  6. 6
    0
    BleepingComputer general
    McGraw-Hill confirms data breach following extortion threat

    Education company McGraw-Hill confirmed hackers exploited a Salesforce misconfiguration to access internal data and subsequently made extortion threats. The breach highlights risks from cloud service misconfigurations in enterprise environments handling sensitive educational data.

  7. 7
    0
    SecurityWeek general
    Europe’s Largest Gym Chain Says Data Breach Impacts 1 Million Members

    Europe's largest gym chain Basic-Fit reported a data breach affecting 1 million members across multiple EU countries, with hackers stealing names, dates of birth, and bank account details. The incident represents one of the largest fitness industry breaches affecting European consumers.

  8. 8
    0
    BleepingComputer general
    Crypto-exchange Kraken extorted by hackers after insider breach

    Cryptocurrency exchange Kraken disclosed that cybercriminals are attempting extortion after an insider breach, threatening to release videos showing internal systems containing client data. The incident highlights insider threat risks at major financial platforms handling sensitive customer information.

  9. 9
    0
    The Record threat-intel
    FBI, Indonesia take down W3LL phishing tool

    The FBI and Indonesian law enforcement dismantled the W3LL phishing tool that allowed hackers to create fake login portals for major services at just $500 per license. This takedown disrupts a widely-used cybercrime-as-a-service platform that enabled large-scale credential theft operations.

  10. 10
    0
    Schneier on Security threat-intel
    On Anthropic’s Mythos Preview and Project Glasswing

    Security expert Bruce Schneier analyzes Anthropic's restricted Claude Mythos Preview model and Project Glasswing initiative, which aims to find and patch vulnerabilities before the AI model's offensive capabilities become publicly available. The analysis examines implications of AI-powered vulnerability discovery outpacing traditional security practices.